LevelBlue Completes Acquisition of Cybereason. Learn more
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
LevelBlue Completes Acquisition of Cybereason. Learn more

Keeping an organization’s IT assets secure in this day and age is a challenge. The sands of the information security landscape are constantly shifting, and it can be difficult for practitioners to find solid footing; to identify those initiatives that will net the greatest return on security spend. Each day seems to bring another emerging concern in the threat landscape. The organization itself often seems to work against us, wanting to expand our already too-broad attack surface by embracing new technologies, connecting with partners, or acquiring other businesses entirely.
In such a climate it can be easy to allow our attention to be drawn to the expanding edge or our environment and the newest threats to be found there. Advanced Persistent Threats (APT), supply chain risks, and cloud/container platform issues, to name a few, are more recent additions to our list of concerns. And let’s be honest, as technologists we are drawn to the new, the novel, the esoteric – because it is interesting. While there are real risks to be addressed here, they may not represent the greatest area of exposure for your users and information assets or the best ROI.
Over the past four years of performing research for monthly threat briefings there are three themes that constantly arise which, if mastered, can greatly reduce the information security risk to the enterprise. These are:

Often, the root cause of a security incident can be traced back to failures associated with one or more of these three points rather than some fringe security exposure. Environments are dynamic, and it is unlikely we can ever be certain that we have 100% coverage for any security practice or solution we put in place; especially over time. As a result, when asked by customers what they should be focusing on, I always recommend they consider these practices critical, foundational elements of their security program and work to validate and improve upon the effectiveness of these capabilities on an ongoing basis.
The truth is that such core security practices not particularly interesting and focusing on the fringe of the threat landscape is far more appealing. The idea that we are on the front lines, in a fight against cybercrime syndicates and cabals of foreign intelligence agents, can add a certain mystique to the information security role. As though we are a combination of Elliot Ness and James Bond ready to win the day.
The trick is not to under-invest resources in those often-mundane components of the security program while we look to the horizon. Perhaps a better role model for the information security function is Wall-E; the trash-compacting protagonist who spends his days cleaning up the mess and trying to put things in order despite the overwhelming scope of the problem. While not as dashing a self-portrait, Wall-E accomplished something that James Bond never did: he introduced new concepts to people, driving awareness, which ultimately invoked a widespread and long-term cultural change for the better. And that is a pretty good day’s work.
LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.